Paid: A probabilistic agent-based intrusion detection system V Gowadia, C Farkas, M Valtorta Computers & Security 24 (7), 529-545, 2005 | 110 | 2005 |
RDF metadata for XML access control V Gowadia, C Farkas Proceedings of the 2003 ACM workshop on XML security, 39-48, 2003 | 62 | 2003 |
An opportunistic authority evaluation scheme for data security in crisis management scenarios E Scalavino, G Russello, R Ball, V Gowadia, EC Lupu Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 23 | 2010 |
Secure cross-domain data sharing architecture for crisis management V Gowadia, E Scalavino, EC Lupu, D Starostin, A Orlov Proceedings of the tenth annual ACM workshop on Digital rights management, 43-46, 2010 | 16 | 2010 |
Policy driven remote attestation A Gopalan, V Gowadia, E Scalavino, E Lupu Security and Privacy in Mobile Information and Communication Systems: Third …, 2012 | 13 | 2012 |
Paes: Policy-based authority evaluation scheme E Scalavino, V Gowadia, EC Lupu Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009 | 9 | 2009 |
A labelling system for derived data control E Scalavino, V Gowadia, EC Lupu Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 …, 2010 | 8 | 2010 |
From XML to RDF: Syntax, Semantics, Security, and Integrity C Farkas, V Gowadia, A Jain, D Roy Security Management, Integrity, and Internal Control in Information Systems …, 2005 | 6 | 2005 |
Tree automata for Schema-level Filtering of XML Associations V Gowadia, C Farkas Journal of Research and Practice in Information Technology 38 (1), 97-109, 2006 | 5 | 2006 |
Intrusion analysis with soft evidential updates V Gowadia, C Farkas, M Valtorta USC CSCE TR-2001-005, Department of Computer Science, University of South …, 2002 | 5 | 2002 |
Agent based intrusion detection with soft evidence V Gowadia, C Farkasl, M Valtorta Proceedings of the 14th IRMA International Conference, 345-350, 2003 | 4 | 2003 |
Models and framework for metadata generation and policy infrastructure V Gowadia, A Scalvino, E Lupu, B Aziz | 2 | 2008 |
Checking security policy compliance V Gowadia, C Farkas, M Kudo arXiv preprint arXiv:0809.5266, 2008 | 2 | 2008 |
Mobile paes: Demonstrating authority devolution for policy evaluation in crisis management scenarios E Scalavino, V Gowadia, R Ball, EC Lupu, G Russello 2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 1 | 2010 |
From XML to RDF: Syntax, Semantics, Security, and Integrity D Roy, V Gowadia, A Jain, C Farkas IFIP International Federation for Information Processing 193 (1), 2010 | | 2010 |
Policy models for compliance checking and xml access control V Gowadia University of South Carolina, 2007 | | 2007 |
INTEGRITY C Farkas, V Gowadia, A Jain, D Roy | | |
Agent Based Intrusion Analysis with Soft Evidence V Gowadia, C Farkas, M Valtorta | | |